Spatial information retrieval which is mainly catalog service based on metadata is the foundation of spatial information sharing. Today's information retrieval methods in catalog service are typically limited to k...
详细信息
ISBN:
(纸本)9781424445622
Spatial information retrieval which is mainly catalog service based on metadata is the foundation of spatial information sharing. Today's information retrieval methods in catalog service are typically limited to keyword searches or matches of sub-strings, which do not meet user's retrieval demand. This paper presents a semantic similarity degree algorithm, in which geo-ontology is compared from concept of the hierarchical structure similarity degree and property similarity degree to adjust the relations of concept. Firstly, overall evaluating the geo-ontology concept hierarchical structure similarity degree and attribute similarity degree; secondly, the semantic similarity degree was calculated as the basis for spatial information retrieval; In the end, the retrieval algorithm was applied in the ldquoOcean Grid Portalrdquo, the retrieval results demonstrate the feasibility and effectiveness of the semantic similarity degree retrieval algorithm.
Home automation systems based on wireless sensor/actuator networks are characterized by diversity of node power sources, limited computational power, and mobility. We propose a routing protocol that fully uses the loc...
详细信息
Home automation systems based on wireless sensor/actuator networks are characterized by diversity of node power sources, limited computational power, and mobility. We propose a routing protocol that fully uses the location of static nodes to limit the search for a route to a small zone based on the analysis of characteristics and requirements. The calculation of two different kinds of zone and the route discovery procedure are described in this paper. According to the environment of home automation, we compared the performance of our routing protocols with the ad-hoc on-demand distance-vector protocol using simulation and gave suggestions for zone selection. Simulation results showed that our routing protocol dramatically reduced the routing overhead and increased the reliability.
This paper presents two new conflict-driven techniques for improving transition fault coverage using multiple scan chains. These techniques are based on a novel test application scheme, in order to break the functiona...
详细信息
ISBN:
(纸本)9781424437696
This paper presents two new conflict-driven techniques for improving transition fault coverage using multiple scan chains. These techniques are based on a novel test application scheme, in order to break the functional dependency of broadside testing. The two new techniques analyze the ATPG conflicts in broadside test generation, and try to control the flip-flops with most influence on the fault coverage. The conflict-driven method selects some flip-flops that work in the enhanced mode and distributes them into different chains. In the multiple scan chain architecture, to avoid too many scan-in pins, some chains are driven by the same scan-in pin to construct a tree-based architecture. Based on the architecture, the new test application scheme allows some flip-flops working in the enhanced mode, while most of others working in the traditional broadside mode. With the efficient conflict-driven selection method, fault coverage is improved greatly, which can also reduce test application time and compress test data volume. Experimental results show that fault coverage based on the proposed method is comparable to the enhanced scan.
In the field of ray-tracing based photo-realistic rendering, kd-tree is used as an important acceleration structure. This paper focuses on the effective construction of kd-tree, and proposes a novel and fast construct...
详细信息
In the field of ray-tracing based photo-realistic rendering, kd-tree is used as an important acceleration structure. This paper focuses on the effective construction of kd-tree, and proposes a novel and fast construction method which is based on the binning algorithm. The method is composed of two main steps. Firstly, by analyzing the SAH cost function, the method determines the most-likely sub-span which holds the splitting plane. Secondly, sub-sampling is used on the resulted span to get much better approximation to the optimal splitting plane. Moreover, the paper discusses the exiting schemes on binning termination condition, points out their problems, and proposes a more reasonable termination condition. The experimental results show that the novel approach is effective. Compared with the previous works, it decreases the construction overhead, improves the quality of generated kd-tree, and the construction procedure is more robust as well.
In this paper, space charge in oil-paper insulation system has been investigated using the pulsed electroacoustic (PEA) technique. A series of measurements were carried out when the insulation system was subjected to ...
详细信息
ISBN:
(纸本)9781424443666
In this paper, space charge in oil-paper insulation system has been investigated using the pulsed electroacoustic (PEA) technique. A series of measurements were carried out when the insulation system was subjected to different applied voltages. Charge dynamics in the insulation system during the volts-on, volts-off and decay have been analyzed. It has been found that homocharge injection occurred both at the anode and the cathode. Positive charges are observed to accumulate in the layers, which indicate that the oil-paper layer interfaces act as a barrier for positive charges. The decay tests showed that after 30min, about a quarter of space charges remained in the sample, about 90% charges disappeared after 2 hours. Finally, total charge variation in these tests were analyzed.
security situational awareness has become a hot topic in the area of network security research in recent years, which attracts the interest of more and more domestic and foreign researchers. The existing security situ...
详细信息
security situational awareness has become a hot topic in the area of network security research in recent years, which attracts the interest of more and more domestic and foreign researchers. The existing security situational awareness methods are analyzed and compared in detail. Considering the characteristics of multi-source information in network security research, a new network security situational awareness model based on information fusion is proposed. This model fuses multi-source information from a mass of logs by introducing the modified D-S evidence theory, gets the values of nodes security situational awareness by situational factors fusion using attacks threat and vulnerability information which network nodes have and successful attacks depend on, computes the value of network security situational awareness by nodes situation fusion using service information of the network nodes, and draws the security-situation-graph of network. Then, it analyzes the time series of the computing results by ARMA model to forecast the future threat in network security. Finally an example of actual network datasets is given to validate the network security situational awareness model and algorithm. The results show that this model and algorithm is more effective and accurate than the existing security situational awareness methods.
This paper analyzes and compares the existing situational awareness methods and proposes a network security situational awareness model based on log audit and performance correction algorithm. First, nodes theoretic s...
详细信息
This paper analyzes and compares the existing situational awareness methods and proposes a network security situational awareness model based on log audit and performance correction algorithm. First, nodes theoretic security threat is got by log audit and the value of nodes security situation is computed by performance correction algorithm. Then the value of network security situation is computed using service information, the future threat is predicted by several prediction models, and the security Situational Graph (SSG) is drawn. Finally an example is given to validate the network security situational awareness model and algorithm by simulation software. The example proves that the model is more effective and accurate to reflect the network security situational and its trends than traditional methods.
The utility evaluation of DRM security policies based on fuzzy analytic hierarchy process (FAHP) and their game-theoretic adoptions were proposed from a novel perspective of the different level security and utilities&...
详细信息
The utility evaluation of DRM security policies based on fuzzy analytic hierarchy process (FAHP) and their game-theoretic adoptions were proposed from a novel perspective of the different level security and utilities' analyses. Based on the analytic hierarchy structure, the fuzzy estimation consistency matrix was employed to analyze the weights of optional security components and services, and then the gained weight values were further used for the computing of security policies' utilities and the accomplishing the game, finally yielding Nash equilibriums, that is, optimal policies profiles, as well as pre-conditions for participants. The use case for a group of the typical security policies shows that the result of the game includes two different groups of security policies profiles, as well as contents/services provider could effectively deploy a DRM system in term of the number of consumers purchasing digital contents, and average purchase, thus achieving the balance between the digital copyrights protection and real payoffs of participants.
In this paper, we present an identity-based explicit authenticated key agreement protocol that is provably secure without random oracles. The protocol employs a new method to isolate a session key from key confirmatio...
详细信息
In this paper, we present an identity-based explicit authenticated key agreement protocol that is provably secure without random oracles. The protocol employs a new method to isolate a session key from key confirmation keys so that there is no direct usage of hash functions in the protocol. The protocol is proved secure without random oracles in a variant of Bellare and Rogaway style model, an exception to current proof method in this style model in the ID-based setting. We believe that this key isolation method is novel and can be further studied for constructing more efficient protocols.
A multi-proxy quantum group signature scheme with threshold shared verification is proposed. An original signer may authorize a proxy group as his proxy agent. Then only the cooperation of all the signers in the proxy...
详细信息
A multi-proxy quantum group signature scheme with threshold shared verification is proposed. An original signer may authorize a proxy group as his proxy agent. Then only the cooperation of all the signers in the proxy group can generate the proxy signature on behalf of the original signer. In the scheme, any t or more of n receivers can verify the message and any t - 1 or fewer receivers cannot verify the validity of the proxy signature.
暂无评论